The course offers introductory hands-on exploration of critical areas in cybersecurity, equipping participants with the necessary skills and knowledge to navigate security challenges. Participants assume the role of a penetration testing team tasked with identifying and exposing vulnerabilities within an organization. This experiential learning approach ensures that learners gain practical experience in simulating real-world scenarios.

Throughout the course, participants gain hands-on experience with industry-standard tools and techniques, such as Nmap for network scanning, Exploit-db for vulnerability exploitation, and the manipulation of malicious Python scripts for privilege escalation. Additionally, the use of Hydra enhances understanding of password-based attacks in reconnaissance and exploitation scenarios.
An experienced instructor will be available to provide guidance and support as needed, allowing participants to focus on refining advanced skills and addressing complex, real-world challenges.
Throughout the course, participants gain hands-on experience with industry-standard tools and techniques, such as Nmap for network scanning, Exploit-db for vulnerability exploitation, and the manipulation of malicious Python scripts for privilege escalation. Additionally, the use of Hydra enhances understanding of password-based attacks in reconnaissance and exploitation scenarios.
An experienced instructor will be available to provide guidance and support as needed, allowing participants to focus on refining advanced skills and addressing complex, real-world challenges.
• Entry-Level Cybersecurity Students
• Novice Penetration Testers
• SOC Analysts/Engineers interested in Red Team activities
1. Collection - Gathering intelligence and sensitive data efficiently and effectively.
2. Privilege Escalation - Understanding methods to gain elevated access within systems to exploit vulnerabilities.
3. Reconnaissance - Techniques and tools to gather information on systems and networks, featuring practical usage of Nmap for scanning and Hydra for password cracking, both for reconnaissance and exploitation.
4. Initial Access - Strategies and vectors through which adversaries gain their first foothold in a network or system.
5. File Analysis - Techniques for examining and interpreting files to detect malicious content or suspicious behavior.
6. Vulnerability Assessment - Techniques to identify and prioritize vulnerabilities in systems to bolster security posture.
7. Discovery - Identifying resources and services within a network environment to pinpoint potential security weaknesses.
8. Defense Evasion - Tactics to identify and develop countermeasures against evasion techniques used by threat actors to bypass existing security mechanisms.
• Entry-Level Cybersecurity Students
• Novice Penetration Testers
• SOC Analysts/Engineers interested in Red Team activities
• Solid foundation in cybersecurity principles.
Workstation Requirements
• Google Chrome browser with Remote Desktop Protocol (RDP) support
• Supported operating systems: Windows, Linux, or macOS
• Chromebooks, tablets, and mobile phones are not supported
• Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities
• When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions
If format is ONLINE Network Requirements
• A minimum of 3 Mbps of internet bandwidth per participant
• No firewall restrictions that block required ports or IP addresses
• Preferred network access configuration:
• Whitelist *.cywaria.net/ and ensure access to port 8443
• An unrestricted internet connection with no port or IP filtering is ideal
• If feasible, participants are encouraged to bring or use personal mobile hotspots